Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
a16549891cbcb29af8bc4ee1bec674c6.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a16549891cbcb29af8bc4ee1bec674c6.html
Resource
win10v2004-20240221-en
General
-
Target
a16549891cbcb29af8bc4ee1bec674c6.html
-
Size
6KB
-
MD5
a16549891cbcb29af8bc4ee1bec674c6
-
SHA1
1999272654f50ecf37d6b74e436d40d1586e5b25
-
SHA256
e72eb0351e4c67cb2829427e65b5a429c04adcc7f63315f62a3343a1ae471008
-
SHA512
c81a5806ac4f2242730bfa501cdcb7cca382b03d6984bc00e27129adb370981771af825ce5784c751ab13c4b2b14e3215a3fec76350e739c4e24ae17b773a0be
-
SSDEEP
96:uzVs+ux7VqLLY1k9o84d12ef7CSTUkScEZ7ru7f:csz7VqAYS/Qb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 5008 msedge.exe 5008 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 2276 5008 msedge.exe 87 PID 5008 wrote to memory of 2276 5008 msedge.exe 87 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 4376 5008 msedge.exe 88 PID 5008 wrote to memory of 1032 5008 msedge.exe 89 PID 5008 wrote to memory of 1032 5008 msedge.exe 89 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90 PID 5008 wrote to memory of 4684 5008 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a16549891cbcb29af8bc4ee1bec674c6.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe58c946f8,0x7ffe58c94708,0x7ffe58c947182⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11531248052500211576,6768494053098270562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD565a51c92c2d26dd2285bfd6ed6d4d196
SHA18b795f63db5306246cc7ae3441c7058a86e4d211
SHA256bb69ea4c761c6299b0abbc78f3728f19b37454a0b4eb607680ed202f29b4bb01
SHA5126156dd7cec9fee04971c9a4c2a5826ba1bb3ef8b6511f1cdf17968c8e5a18bc0135510c2bd05cc26f3e7ae71f6e50400cf7bec536b78d9fa37ede6547cfa17e0
-
Filesize
152B
MD5ce1273b7d5888e76f37ce0c65671804c
SHA1e11b606e9109b3ec15b42cf5ac1a6b9345973818
SHA256eb1ba494db2fa795a4c59a63441bd4306bdb362998f555cadfe6abec5fd18b8c
SHA512899d6735ff5e29a3a9ee7af471a9167967174e022b8b76745ce39d2235f1b59f3aa277cc52af446c16144cce1f6c24f86b039e2ca678a9adac224e4232e23086
-
Filesize
6KB
MD5543e9dad2255cf0f27b15206853fb9c9
SHA16788b5ab7d8d97ee424a77caa2a4cdb0b8cf50c6
SHA25650867d57ec4e17da702b7146bdd0beb6d12064ffa6e7c3d72af1a6b54038f2d6
SHA512ddb44471d33a36d77404174720501a9b173380741e116b9518bd0a795985e11a8ec20febc2b2dc387a04ad67bb7c5dc200f901e8a23f6b2754c64a95516b03b9
-
Filesize
6KB
MD5c6c69cd2f85ec1e1a96648a380693570
SHA168d2c8297446a82b0d5aa0455b3107e8ff1ed490
SHA256538307aac0e8e9702e7dd2b680f2ecf3716556a8a2629e1a694f876ac6696f00
SHA51219db0b401470ba646d88a5e2786bd8e0e6b9dac87cde29358b54ee7504c4346bf91c2238f6cf3fb23695730a6969ece7cdad327d8f2858e3c6e59ca32d853937
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD58f9e52116bf353496e5183ace11f99d1
SHA18c1da4dd030ce836649747f2746906df18915e29
SHA256c29bb82a270d351a83e1a58f95f2a48ce051c3a70c4011f54d90e3a12730a0eb
SHA5124def0367f9390e944af52e9aaba1a10fb030369d0b16ff9e58deb0581880b917b7699cd16f10739521a47ca063a74a394293051a3c91c8ab028f1a1824b5c55b